Resource Library:

AFCEA offers a wide range of white papers, EBooks, case studies, event videos and analytical content in our Resource Library. These documents may be relevant to your work and of interest to you as a member of the global defense, security and intelligence community. The content updates often so please bookmark this page and come back frequently.

Registration is required to access the documents. This registration information is minimal and is only shared with the sponsor of the specific document you access.

For information regarding posting content in the Resource Library, please contact Jennifer Deuterman by phone (703) 631-6181 or Email or your SIGNAL account executive.

Filter the library by ...

   

Today’s Insider Threat – It’s Real!
Author: Great Lakes Case and Cabinet Co., Inc.   Send Email to POC   View Content
As commercial corporations and government agencies continue to spend countless millions of dollars on protecting their most valued asset (data) from outside cyber-attacks and ever so increasing insider threat potential, not nearly enough attention has been given to physical security. There is typically little consideration for protecting and limiting the unmonitored access to the equipment housing the data. Over the last decade, a tremendous emphasis has been placed on the cyber security community to stand up to elaborate attacks; threat and security operation centers, ...

TechNet Augusta 2018 Solutions Showcase Compendium
Author: AFCEA   Send Email to POC   View Content
As part of TechNet Augusta 2018, the U.S. Army identified 11 areas as opportunities for the private sector to share potential solutions for the problems the service faces in the cyber electromagnetic activities arena. The association reached out to industry and received more than 40 potential solutions from a range of innovators with technical and thought-provoking approaches to addressing difficult problems. Read how entrepreneurs, pioneers and large companies recommend the Army solve some of their biggest challenges.

Securing Government Desktops from Cyber Threats with the Latest KVM Technology
Author: Belkin International   Send Email to POC   View Content
Foreign nations, terrorists, and cyber criminals see state and local government IT infrastructure as an extremely attractive target for data theft, attacks, and disruption. Attacks have taken down entire systems, destroyed valuable equipment, and left many government agencies repeatedly vulnerable in countries throughout the world. To combat threats, Federal agencies are looking for ways to enable employee productivity while ensuring air-tight seals between networks, protecting from both internal and external threats. Keyboard-Video-Mouse (KVM) switching devices can ass ...

Building a Culture of Cybersecurity: A Guide for Corporate Executives and Board Members
Author: CompTIA   Send Email to POC   View Content
According to the World Economic Forum, a majority of business leaders indicated that cyberattacks are their top concern heading into 2018. For many organizations, there needs to be an important shift in mindset: Security can no longer be thought of as a technical problem with a technical solution; it must be treated as a critical business concern.

Is Your Investment in Cybersecurity Training Paying Off?
Author: CompTIA   Send Email to POC   View Content
The modern world takes place in a largely digital space. Underneath the physical assets that drive our businesses are mountains of data and personal information. The digitizing of information has had a major impact on the business world, creating large, complicated systems. At the foundation of it all is the ability to create a secure network infrastructure; without proper security measures and controls in place, it is impossible for an organization to move forward with confidence. Security is at the foundation of an organization's ability to provide reliable, scalable ...

Cyber Threat Intelligence: Moving cyber security to the heart of our business
Author: KPMG   Send Email to POC   View Content
Cyber Threat Intelligence (CTI) is a collection of data points (e.g. Open source, Social media, Human, Deep Web) and ultimately boils down to three questions:
- What do you have of value or importance?
- Who wants to disrupt your Agency or take what you have?
- What mechanisms and environmental factors exist for attackers to be successful in their attack?

CTI is used to research & analyze trends and technical developments of actors who target a specific organizations. This capability has generally existed within the security operations and incident r ...

Solving the Cybersecurity Challenges of Federal Agencies
Author: Fortinet   Send Email to POC   View Content
Managing today's network infrastructures can present challenges for federal agency IT leaders-from demands for higher performance,
to compliance with new standards and regulations, to integrating emerging technologies as part of digital transformation (DX). While some
changes introduce new, dynamic features and IT capabilities, they can also make the network more vulnerable.

Fortinet Federal is focused on helping U.S. government agencies address the unique security requirements of their environments. A dedicated team based in the Washington, D.C., area, Fo ...

Big Data Analytics and Cybersecurity: Three Challenges, Three Opportunities - By: AFCEA Cyber Committee
Author: AFCEA   Send Email to POC   View Content
This white paper provides recommendations on the applications of big data analytics and data science generally to the cybersecurity domain. It examines ways in which big data can be used to improve predictive analytics and to detect anomalous behavior that may be indicative of cybersecurity problems such as exploits or attacks. This paper also
examines the special challenges the security of big data environments
pose given the enhanced value of information that is made part of and subject to analysis within such environments. In addition, it discusses the implica ...

It’s Time for a Smarter Approach: Threat-Centric Vulnerability Management
Author: Skybox   Send Email to POC   View Content
Your approach to vulnerability management may be putting your organization at greater risk. Just dealing with vulnerabilities that a vendor said were "critical" isn't enough and may still leave you susceptible to an attack. Attackers are embracing ransomware and other forms of distributed cybercrime made readily available as packaged exploit kits and services on the dark web. These attacker tools target low-hanging
fruit by exploiting a surprisingly small number of vulnerabilities, many of which wouldn't be tagged as a high priority in a purely vulnerability-centric ...

Transforming Datacenter Operations at the Tactical Edge
Author: Nutanix   Send Email to POC   View Content
The DoD faces the ever-changing, diverse environment of cyber operations at the tactical edge where agile, easy-to-use, effective, and resilient IT infrastructure is paramount to success. To ensure information dominance and operational agility in the battlefield, the modern Warfighter requires innovative, lightweight, purpose-built infrastructure that supports mission-critical applications with rapid deployment, high availability, linear scaling and secure operations. Deploying such enterprise-grade data center solutions to the tactical edge with minimal physical footpr ...

Aligning with the Critical Security Controls to Achieve Quick Security Wins
Author: Carbon Black   Send Email to POC   View Content
Defending against malware and other malicious attacks is the highest priority for organizations, but it doesn't have to be complicated. To help businesses and agencies develop comprehensive solutions that tackle hacking, the Center for Internet Security Critical Security Controls for Effective Cyber Defense offers guidance for prioritizing security processes, and standardization and automation are among its 20 Critical Security Controls derived from frameworks such as NIST SP 800-53. Carbon Black experts describe some of the simple defense measures your organization eas ...

Threat Hunting For Dummies, Carbon Black Special Edition
Author: Carbon Black   Send Email to POC   View Content
Adversaries, and cybercriminal organizations in particular, are building tools and using techniques that are becoming so difficult to detect that organizations are having a hard time knowing that intrusions are taking place. Passive techniques of watching for signs of intrusion are less and less effective. Environments are complicated, and no technology can find 100 percent of malicious activity, so humans have to "go on the hunt." This guide introduces the concept of threat hunting and the role it plays in the protection of your organization's systems and information.

The Cyber Edge - April 2017
Author: AFCEA   Send Email to POC   View Content
The April 2017 version of SIGNAL's quarterly The Cyber Edge examines solutions being pursued across a range of theaters in the cyber realm.
- U.S. Navy Fleet Cyber Command Chief Rear Adm. Michael M. Gilday, USN, describes the challenges facing the sea service in cyberspace.
- Research into quantum security already is leading to applications in that esoteric area.
- A new commercial approach to cybersecurity effectively renders a network invisible to attackers.
- Cyber warriors must change their tactics on the fly as adversaries continue to innovate.

Cybersecurity - A Strategic Problem
Author: IT Cadre   Send Email to POC   View Content
Businesses, government agencies, military units, and academic institutions are more effective and productive today than they were 30 years ago because of the opportunities and efficiencies gained in a networked world. However, this improved productivity comes with new risk. For many organizations, information is the most valuable asset they possess. Their existence is tied to their ability to both use and protect this vital information. Protecting that information has to span the complex environments of corporate owned storage networks, individual workstations, cloud se ...

Big Data Analytics and Cybersecurity: Three Challenges, Three Opportunities - By: AFCEA Cyber Committee
Author: AFCEA   Send Email to POC   View Content
This white paper provides recommendations on the applications of big data analytics and data science generally to the cybersecurity domain. It examines ways in which big data can be used to improve predictive analytics and to detect anomalous behavior that may be indicative of cybersecurity problems such as exploits or attacks. This paper also
examines the special challenges the security of big data environments
pose given the enhanced value of information that is made part of and subject to analysis within such environments. In addition, it discusses the implica ...

Feds: You have a BYOD program whether you like it or not
Author: Lookout   Send Email to POC   View Content
Many agencies believe they aren't actually subject to cyber-threats from mobile devices because, simply, they don't currently allow personal mobile devices to access their networks. Ultimately, however, this posture puts the government and its data at risk because federal agencies have a BYOD program whether they like it or not. After analyzing 20 federal agencies, Lookout discovered 14,622 Lookout-enabled devices associated with government networks. That means people are connecting their phones to your systems. What's more is that the frequency of serious mobile threa ...

Cybersecurity Best Practices: Learn and Apply the NIST Framework
Author: CISCO   Send Email to POC   View Content
Threats evolve. Defenders must adapt. And in spite of this, data breaches still happen on a daily basis. Traditional cybersecurity defenses that rely exclusively on detection and blocking are no longer adequate. You need a new security approach. One that covers the entire attack continuum- before, during, and after an attack. We can help you achieve it. Organizations of all sizes can benefit from the new cybersecurity best-practices framework from the National Institute of Standards and Technology (NIST). Learn how you can simplify and harden your security approach with ...

Miniaturized, Ruggedized SDR Transceivers for Cyber-EW/COMMS/SIGINT Handheld Applications
Author: Spectranetix   Send Email to POC   View Content
MicroScan® Miniaturized, Ruggedized SDR Transceivers are designed for customized 70-6000 MHz Communications, Signal Monitoring, and EW applications where small size is important.

Threat Intelligence & Incident Response: A Study of U.S. & EMEA Organizations
Author: AccessData Group   Send Email to POC   View Content
A Study of U.S. & EMEA Organizations, sponsored by AccessData, surveyed 1,083 CISOs and security technicians in the United States and EMEA about how their company handles the immediate aftermath of a cyber-attack and what would help their teams more successfully detect and remediate these events.
Learn the unsettling truth about how limited todays information security departments really are when it comes to defending their domains, including:
What % of cyber attacks are never detected?
How many orgs are incapable of leveraging threat intelligence to defend a ...

Key Cyber Issues and Recommendations: A Way Forward
Author: AFCEA   Send Email to POC   View Content
Given the breakneck speed of technological change, challenges associated with developing/issuing national policy and concomitant adversary capabilities, government often finds itself behind the curve with respect to coordinated
cybersecurity readiness and response. The sheer size and number of agencies with their various systems, missions and legal mandates make it difficult to know how major cyber threats should be addressed and cyber events can be mitigated. Decisions on response actions are delayed or rejected due to lack of understanding on the consequences of th ...